The Terrorist – Hacker Hacktivist Distinction

Total Page:16

File Type:pdf, Size:1020Kb

The Terrorist – Hacker Hacktivist Distinction This is an accepted manuscript version for a book chapter published in Terrorists' Use of the Internet. Please cite as: Tanczer, L.M. (2017). The Terrorist – Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists. In M. Conway, L. Jarvis, O. Lehane, S. Macdonald & L. Nouri (Eds.), Terrorists' Use of the Internet. (pp. 77-92). Amsterdam: IOS Press. The final publication is available at IOS Press through http://dx.doi.org/10.3233/978-1-61499-765-8-77. The copyright belongs to the author. www.iospress.nl Electronic copy available at: https://ssrn.com/abstract=2998202 The Terrorist – Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists Leonie Maria TANCZERa,1 aUniversity College London Abstract. The academic literature on terrorism is filled with references to online activities and the equation of hacking and hacktivism (i.e., politically motivated hacking) with cyberterrorism. This perspective ignores differences in capacities, scope, and motives in hackers/hacktivists. Besides, scholarly research is lacking examinations of those being perceived as alleged ‘security threats’. The present paper therefore uses interviews with self-identified hackers and hacktivists (N = 35) to address this gap. It examines the distinction between hacking, hacktivism, and cyberterrorism and studies the discourses and practices of hackers and hacktivists. Building upon the theoretical concept of (in)securitisation and the method of thematic analysis, the findings provide insights into the perceived (a) external assessment of hackers and hacktivists by external actors and their (b) self-assessment that stands in contrast to the viewpoints expressed earlier. The results highlight interviewees’ objection to the translation of hacking and hacktivism into violent acts of any nature, with participants articulating that the connection of these concept poses threats to civil liberties and political rights online. The paper has implications both for the academic as well as professional discourse. It seeks to foster a more reflected engagement with these concepts and is pointing to the need for concrete terminological delineations. Keywords. Hacking, hacktivism, cyberterrorism, cybersecurity, online activism, critical terrorism studies 1. Introduction The terrorism literature is filled with references to online activities, amplified through the gradient use of the internet and its substantial penetration of nearly all aspects of our life. With these developments in mind, also the fear of an alleged ‘cyberterrorism’ attack is gaining popularity. This is fuelled by the medial and academic discourse [1], while empirical observations of its factual existence and impact are practically absent. Particularly the interconnectedness of cyberterrorism with the concepts of hacking and less frequently hacktivism are thereby noteworthy. These perceptions range from hackers depicted as terrorists as well as terrorist hackers [2], notions of hackers-for-hire, or the understanding of hacktivists as being essentially cyberterrorists [3]. Specifically the latter equation of hacktivism and cyberterrorism is hereby of concern. It implies the labelling of politically motivated hacking as a form of online activism being akin to fundamental violent acts such as terrorism. This shifts the clichéd claim of ‘one person’s terrorist is another’s freedom fighter’ [4] onto the online sphere. While past examinations within the terrorist literature have engaged with this question [3,5,6], many of the existing publications fail to engage with the hacker and hacktivist community themselves. This creates a notional engagement with the issue, leaving a blind spot to the ethnographic dynamics and the voice of self-identified hackers and hacktivists. The current paper therefore uses the existing literature on the topic as a starting point to re-emphasise the idea that hacking and hacktivism should not be mistaken for terrorism. This is done through interviews with those directly affected by this equation. Thus, the paper investigates the discourse and practices of self-identified hackers and hacktivists. The analysis firstly provides a conceptual grounding of the terms while reviewing the existing publications on the issue. It thereupon outlines the methods used in this study, which is followed by an in-depth analysis of the arguments provided by the interviewed participants. The paper ends with a discussion on the broader implications of the findings for both academics and security practitioners and hopes to stimulate a more critical, reflective engagement with the concept of hacking and hacktivism. 1.1. From Terror to Cyber to Hacktivism Debates on terrorism have marked the academic literature for decades. The disputes range from definitional discrepancies to the methodological challenges of studying such an amorphous concept. Although scholars 1Corresponding Author. Electronic copy available at: https://ssrn.com/abstract=2998202 such as Schmid and Jongman [7] try to provide elaborate examinations that seek to give an all- encompassing definition of this “method or technique of instrumental terror” (p. 55) [8], the idea of a distinct form of ‘cyber’-terrorism adds to the complexity of what characterises terrorism from, for example, other forms of political violence. Just as Laqueur [9] claims that society is confronted with “different terrorisms” (p. 99), cyberterrorism seems in this regard only as one further form of a broader range of tactics. Despite the existence of the term cyberterrorism for nearly twenty years [10,11] the concept itself is contested and contradictory [1]. Probably one of the most commonly cited sources on the issue relates back to Denning [12] and her testimony before the United States (US) Special Oversight Panel on Terrorism: Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not. Notwithstanding the severity that Denning [12] expresses, publications frequently associate very benign activities such as website defacements with cyberterrorism. Weimann [13] echoed this, arguing that while concerns about the potential danger posed by cyberterrorism are according to him well founded, the fears that have been voiced in the media, political arenas or public forums seem not always reasonable. Incidents by individual hackers or hacktivist collectives such as Anonymous have repeatedly been conflated with the spectre of cyberterrorism. For example, leaked documents display that associated members of the hacktivist collective Anonymous were put on a FBI terrorism watch list prior to their arrest [14]. This, however, does not sufficiently represent their often innocuous intent. Some are aiming to reveal injustices or security flaws. While these acts might disrupt normal operations, cases are rare – if not inexistent – in which these incidents are then actually causing the kind of ‘serious’ damage Denning [12] is articulating. Besides, these examples not only raise a concern regarding the way the concepts of computer misuse or terrorism are framed, but also in relation to the way hackers and hacktivists are perceived. Hackers or hacktivists are part of what Mott [15] called the “faceless detractors of security” (p. 34). This idea is deriving from the physical distance between the attacker and the target but also the inherent inability to actively see and frequently also identify the assailant. Hacking, as already highlighted in an earlier publication [16], relates to computer hacking [17], which can be considered as activities ranging from gaining unauthorized access to systems or data [18], to the production of free software [19], to manipulating technology for unorthodox means [20]. Hackers’ representation has undergone a massive shift. Initially associated with a “geeky, apolitical (…) boyish” character (p. 1167) towards malicious thieves, or even the embodiment of terrorism [21]. Hacktivism on the other hand occupies an ambiguous position within the body of literature. The term has not been coined by Denning [22], as argued by some authors [13], but seems to date back far earlier to 1994. It derived from a member of the hacker collective ‘Cult of the Dead Cow’ [23] to describe hacking for political purposes. Hacktivism is a conflation of hacking and activism and currently commonly linked with publicly known collectives such as Anonymous, LulzSec, and to certain extend even the whistle- blower platform WikiLeaks [24-27]. While in many instances the term is associated with negative connotations, authors such as Deibert and Rohozinksi [28] or Kingsmith [24] perceive hacktivism rather positively. Hacktivists’ ability to build tools which promote access to information and openness through the circumvention of surveillance and filtering are considered useful across various
Recommended publications
  • Additional Resources
    Resource Guide to Communication Scholarship on Social Justice Activism Lawrence R. Frey, Kellie Brownlee, Jeanette Musselwhite Additional Resources Conceptual/Theoretical Scholarship on Communication and Social Justice Activism A. Communication Aldás, E. N., & Pinazo, D. (2013). “Communication and engagement for social justice.” Peace Review, 25, 343–348. doi:10.1080/10402659.2013.816552 Andersen, P. A. (1993). “Beyond criticism: The activist turn in the ideological debate.” Western Journal of Communication, 57, 247–256. doi:10.1080/10570319309374447 Barge, J. K. (Ed.). (1996). “Dialogue: Communication and social justice [Special section].” Communication Studies, 47, 110–151. Contains the essays: Frey, L. R., Pearce, W. B., Pollock, M. A., Artz, L., & Murphy, B. A. O. “Looking for justice in all the wrong places: On a communication approach to social justice.” 110–127. doi:10.1080/10510979609368467 Wood, J. T. “Social justice research: Alive and well in the field of communication.” 128–134. doi:10.1080/10510979609368468 Makau, J. M. “Notes on communication education and social justice.” 135–141. doi:10.1080/10510979609368469 Pollock, M. A., Artz, L., Frey, L. R., Pearce, W. B., & Murphy, B. A. O. “Navigating between Scylla and Charybdis: Continuing the dialogue on communication and social justice.” 142–151. doi:10.1080/10510979609368470 Broome, B. J., Carey, C., De La Garza, S. A., Martin, J., & Morris, R. (2005). “In the thick of things: A dialogue about the activist turn in intercultural communication.” In W. J. Starosta & G.-M. Chen (Eds.), Taking stock in intercultural communication: Where to now? (pp. 145–175). Washington, DC: National Communication Association. Carragee, K. M., & Frey, L.
    [Show full text]
  • The James Bond Quiz Eye Spy...Which Bond? 1
    THE JAMES BOND QUIZ EYE SPY...WHICH BOND? 1. 3. 2. 4. EYE SPY...WHICH BOND? 5. 6. WHO’S WHO? 1. Who plays Kara Milovy in The Living Daylights? 2. Who makes his final appearance as M in Moonraker? 3. Which Bond character has diamonds embedded in his face? 4. In For Your Eyes Only, which recurring character does not appear for the first time in the series? 5. Who plays Solitaire in Live And Let Die? 6. Which character is painted gold in Goldfinger? 7. In Casino Royale, who is Solange married to? 8. In Skyfall, which character is told to “Think on your sins”? 9. Who plays Q in On Her Majesty’s Secret Service? 10. Name the character who is the head of the Japanese Secret Intelligence Service in You Only Live Twice? EMOJI FILM TITLES 1. 6. 2. 7. ∞ 3. 8. 4. 9. 5. 10. GUESS THE LOCATION 1. Who works here in Spectre? 3. Who lives on this island? 2. Which country is this lake in, as seen in Quantum Of Solace? 4. Patrice dies here in Skyfall. Name the city. GUESS THE LOCATION 5. Which iconic landmark is this? 7. Which country is this volcano situated in? 6. Where is James Bond’s family home? GUESS THE LOCATION 10. In which European country was this iconic 8. Bond and Anya first meet here, but which country is it? scene filmed? 9. In GoldenEye, Bond and Xenia Onatopp race their cars on the way to where? GENERAL KNOWLEDGE 1. In which Bond film did the iconic Aston Martin DB5 first appear? 2.
    [Show full text]
  • Första Bilderna Från Inspelningen Av SPECTRE
    Första bilderna från inspelningen av SPECTRE SPECTRE - THE 24TH JAMES BOND ADVENTURE WATCH FIRST FOOTAGE FROM THE SET OF SPECTRE ON www.007.com FIRST LOOK IMAGE OF DANIEL CRAIG IN SPECTRE AVAILABLE ON www.sffilm.se At 07:00 on Thursday 12th February, watch the first exciting footage of SPECTRE from Austria on www.007.com. Featuring behind the scenes action with Daniel Craig, Léa Seydoux, Dave Bautista and Director Sam Mendes. Associate Producer, Gregg Wilson says "We have to deliver an amazing sequence and this is going to be one of the major action sequences of the movie, a jewel in the crown so to speak. It's going to be spectacular and Austria seemed to offer everything that we needed to pull it off." Production Designer Dennis Gassner adds, "The thing that Sam and I talked about was how we are going to top SKYFALL, it's going to be SPECTRE and so far it's a great start. I think that we are going to continue the history of the Bond films, making things that are exciting for the audience to look at and what could be more exciting than to be on top of the world." SYNOPSIS: A cryptic message from Bond's past sends him on a trail to uncover a sinister organisation. While M battles political forces to keep the secret service alive, Bond peels back the layers of deceit to reveal the terrible truth behind SPECTRE. SPECTRE will be released on November 6, 2015 Also available on the official James Bond social channels facebook.com/JamesBond007 and @007 About Albert R.
    [Show full text]
  • Digital Activism in Asia: Good, Bad, and Banal Politics Online
    Asiascape: Digital Asia 7 (2020) 5-19 brill.com/dias Digital Activism in Asia: Good, Bad, and Banal Politics Online Bart Barendregt Leiden Institute of Cultural Anthropology and Sociology, Leiden, the Netherlands [email protected] Florian Schneider Leiden University Institute for Area Studies, Leiden, the Netherlands [email protected] Abstract This article introduces the special issue on ‘Digital Activism’ by exploring some of the trends in social media activism and scholarship thereof. The authors ask to what extent this literature helps us understand Asian forms of online activism, which forms of activism have relatively done well, and whether Asian activism requires its own the- orizing. Most of all, it is a plea for a careful and ethnographically informed approach to digital activism. Although outwardly they look similar and use the same templates, manuals, or even similar media strategies, not all forms of online activism promote democratic values. Furthermore, we argue that much of what happens under the ban- ner of digital activism is not necessarily politics with a capital P but, rather, consists of everyday forms of engagement, with sometimes seemingly vulgar contents and often familiar routines and natural forms, yet in their impact such ‘banal activism’ may have political implications. Keywords Asia – civic engagement – digital activism – mediatization – online community – social media © Koninklijke Brill NV, Leiden, 2020 | doi:10.1163/22142312-bja10004Downloaded from Brill.com09/25/2021 02:48:27AM via free access 6 Barendregt and Schneider 1 Hopes and Hoaxes New media have always held not just the promise of compressing space/time but also, and inherently, of spreading the values of transparency and democ- racy and of serving as a potential means of better and just governance.
    [Show full text]
  • Why We Should Consider the Plurality of Hacker and Maker Cultures 2017
    Repositorium für die Medienwissenschaft Sebastian Kubitschko; Annika Richterich; Karin Wenz „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures 2017 https://doi.org/10.25969/mediarep/1115 Veröffentlichungsversion / published version Zeitschriftenartikel / journal article Empfohlene Zitierung / Suggested Citation: Kubitschko, Sebastian; Richterich, Annika; Wenz, Karin: „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures. In: Digital Culture & Society, Jg. 3 (2017), Nr. 1, S. 185– 195. DOI: https://doi.org/10.25969/mediarep/1115. Erstmalig hier erschienen / Initial publication here: https://doi.org/10.14361/dcs-2017-0112 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer Creative Commons - This document is made available under a creative commons - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0 Attribution - Non Commercial - No Derivatives 4.0 License. For Lizenz zur Verfügung gestellt. Nähere Auskünfte zu dieser Lizenz more information see: finden Sie hier: https://creativecommons.org/licenses/by-nc-nd/4.0 https://creativecommons.org/licenses/by-nc-nd/4.0 “There Simply Is No Unified Hacker Movement.” Why We Should Consider the Plurality of Hacker and Maker Cultures Sebastian Kubitschko in Conversation with Annika Richterich and Karin Wenz Sebastian Kubitschko is a postdoctoral researcher at the Centre for Media, Communication and Information Research (ZeMKI) at the University of Bremen in Germany. His main research fields are political communication, social movements and civil society organisations. In order to address the relevance of new forms of techno-political civic engagement, he has conducted qualitative, empirical research on one of the world’s oldest and largest hacker organisations, the Chaos Computer Club (CCC).
    [Show full text]
  • Spectre, Connoting a Denied That This Was a Reference to the Earlier Films
    Key Terms and Consider INTERTEXTUALITY Consider NARRATIVE conventions The white tuxedo intertextually references earlier Bond Behind Bond, image of a man wearing a skeleton mask and films (previous Bonds, including Roger Moore, have worn bone design on his jacket. Skeleton has connotations of Central image, protag- the white tuxedo, however this poster specifically refer- death and danger and the mask is covering up someone’s onist, hero, villain, title, ences Sean Connery in Goldfinger), providing a sense of identity, someone who wishes to remain hidden, someone star appeal, credit block, familiarity, nostalgia and pleasure to fans who recognise lurking in the shadows. It is quite easy to guess that this char- frame, enigma codes, the link. acter would be Propp’s villain and his mask that is reminis- signify, Long shot, facial Bond films have often deliberately referenced earlier films cent of such holidays as Halloween or Day of the Dead means expression, body lan- in the franchise, for example the ‘Bond girl’ emerging he is Bond’s antagonist and no doubt wants to kill him. This guage, colour, enigma from the sea (Ursula Andress in Dr No and Halle Berry in acts as an enigma code for theaudience as we want to find codes. Die Another Day). Daniel Craig also emerged from the sea out who this character is and why he wants Bond. The skele- in Casino Royale, his first outing as Bond, however it was ton also references the title of the film, Spectre, connoting a denied that this was a reference to the earlier films. ghostly, haunting presence from Bond’s past.
    [Show full text]
  • Sector 17 1 TABLE of CONTENTS
    BlueVoyant | Sector 17 1 TABLE OF CONTENTS Executive Summary 3 Key Findings 4 Part 1: Industry Overview 5 Part 2: Threat Landscape 7 Section 1: Criminal Pursuit of Sensitive Financial Information 7 Section 2: Extortion (Non-Ransomware) 9 Section 3: Ransomware 10 Section 4: Criminal Pursuit of PII 11 Section 5: Third-Party Risks 12 Section 6: Password Breaches and Leaks 14 Section 7: Hacktivism 16 Part 3: Dark Web Overview 18 Part 4: Industry Cybersecurity Review 24 Section 1: Legal Sector Overview – Global 24 Section 2: Legal Sector Overview – In Depth 25 Conclusion - Sector 17 28 Citations and Endnotes 29 Recommendations 30 BlueVoyant | Sector 17 2 EXECUTIVE SUMMARY In 2013, the Department of Homeland Security defined 16 sectors critical to securing national infrastructure, resources, and resiliency1. BlueVoyant, a company made up of seasoned cybersecurity experts, including former leaders in our intelligence and law enforcement communities, has identified one more: the legal sector. The integrity of U.S. and international law firms is indispensable ot the functioning of our economies and key public and private institutions. The legal sector ensures justice and order, as well as providing mechanisms that encourage and safeguard innovation and economic growth. The lawyers who help interpret, apply, and enforce the law necessarily become trusted advisors to individuals and corporations. Like healthcare institutions, law firms hold troves of personally identifiable information (PII); they also hold critical intellectual property (IP) and sensitive data for clients. Like banks and credit unions, law firms are critical to the proper functioning of our economy. And like no other sector, except perhaps government, law firms act as a major arbiter and safekeeper of public trust.
    [Show full text]
  • A DIY Guide to Rob Banks by Subcowmandante Marcos
    _ _ _ ____ _ _ | | | | __ _ ___| | __ | __ ) __ _ ___| | _| | | |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / | | _ | (_| | (__| < | |_) | (_| | (__| <|_| |_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_) A DIY guide to rob banks ^__^ (oo)\_______ ( (__)\ )\/\ _) / ||----w | (.)/ || || `' Formatted and distributed by ftp://distro "Live Communism, Spread Anarchy!" ------------------------------------------------------------------------------------ by Subcowmandante Blog: Marcos https://ftpdistro.noblogs.org Instagram: https://instagram.com/ftp.distro Store: https://ftpdistro.github.io Translation of Phineas Fishers Cayman Bank Hack Communique No Copyright 2020© Set in Source Code Pro (24pt, 10pt) and Garamond (12pt) ******************************* We were born at night. We live in it, we hack in it. Here we are, we are the rebel dignity, the forgotten heart of the Интернет. Translation notes: Our fight is for memory and justice, Bulk of translation done by Google Translate (which and the bad government is filled with criminals and did a remarkably good job outside of slang and computer terms!), with edits for clarity and murderers. formatting by @laudecay. I got the Spanish version from the bottom of this article, it’s in the leak: Our fight is for fair and decent work, https://unicornriot.ninja/2019/massive-hack-strikes- and bad government and corporations buy and sell zero offshore-cayman-national-bank-and-trust/ days. The UR article also has a lot of info about the history of Phineas’s hacks and resources she’s provided to the community in the past, and Crimethinc For all tomorrow. has some interviews with her.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Cybersecurity Forum Für Datensicherheit, Datenschutz Und Datenethik 23
    3. JAHRESTAGUNG CYBERSECURITY FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK 23. APRIL 2020, FRANKFURT AM MAIN #cyberffm Premium-Partner: Veranstaltungspartner: 3. JAHRESTAGUNG CYBERSECURITY DEUTSCHLAND — DIGITAL — SICHER — BSI Die Schadsoftware »Emotet« hat uns in den letzten Wochen und Monaten erneut schmerzhaft vor Augen geführt, welche Auswirkungen es haben kann, wenn man die Vorteile der Digitalisierung genießt, ohne die dafür unabdingbar notwendige Infor- mationssicherheit zu gewährleisten. Stadtverwaltungen, Behörden, Krankenhäuser und Universitäten wurden lahmgelegt, Unternehmen mussten zeitweise den Betrieb einstellen. Die Folgen sind für jeden von uns spürbar: Arbeitsplätze sind in Gefahr, Waren und Dienstleistungen können nicht mehr angeboten und verkauft werden, Krankenhäuser müssen die Patientenannahme ablehnen. Stadtverwaltungen sind nicht mehr arbeitsfähig und schließen ihre Bürgerbüros. Bürgerinnen und Bürger konnten keine Ausweise und Führerscheine beantragen, keine Autos anmelden und keine Sperrmüllabfuhr bestellen. Sogar Hochzeiten mussten verschoben werden. Und wie würde die Lage wohl erst aussehen, wenn wir tatsächlich in einer voll digitalisierten Welt lebten? Das BSI beschäftigt sich damit, in welchen Anwendungsfeldern der Digitalisierung Risiken entstehen könnten und wie wir diese Risiken kalkulierbar und beherrschbar machen können. Unsere Stärke ist es, Themen der Informationssicherheit gebündelt fachlich zu analysieren und aus der gemeinsamen Analyse heraus konkrete Angebote für unterschiedliche Zielgruppen
    [Show full text]
  • Poking the Bear: Feminist Online Activism Disrupting Conservative Power
    DSJ, 5(Fall 2019/2020), 28-44 ISSN: 2578-2029 Copyright © 2020 Research Articles Poking the Bear: Feminist Online Activism Disrupting Conservative Power Rusa Jeremic University of Toronto INTRODUCTION his is the time for a critical digital pedagogy that simultaneously recognizes both the potential inherent in social media to challenge power and build movements and the dangers T lurking in a fake news era that spreads hate, division, and distraction. This paper explores how Canadian digital feminist activists challenged conservative power over three federal elections with innovative creativity using critical pedagogical humour that resulted in an impromptu online social movement focused on ousting the Prime Minister. CHALLENGING AUTHORITARIAN POWER WITH A SMILE efore Trump, Canadian Conservative Party member Stephen Harper sat as Prime Minister from 2006-2015. Although Harper might appear a stark contrast to the bombastic Trump, B while in power, he enacted policies that were nothing short of a slow erosion of Canadian democracy. He ruled by stealth through a steady and consistent attack on fundamental Canadian values. Harper refused to speak to the media, enacted policies that violated and eroded women’s rights, and vowed to create a “barbaric cultural practices” (Andrew-Gee, 2015, para 1) snitch line targeting immigrants, amongst other inflammatory acts. His actions signalled a turn toward authoritarianism and a battle of competing ideologies. Parallel to Harper’s time in power, the emergence of Web 2.0 social media tools created the opportunity for all kinds of people to engage in online activism as content producers/educators. A good number of those people were women.
    [Show full text]
  • 2016 CYBERTHREATS and TRENDS REPORT Verisign Idefense® Security Intelligence Services CONTENTS
    2016 CYBERTHREATS AND TRENDS REPORT Verisign iDefense® Security Intelligence Services CONTENTS INTRODUCTION 3 EXECUTIVE SUMMARY 4 CYBERCRIME 6 Criminal Migration to the Darknet 6 Ransomware-as-a-Service 6 The Rise of DD4BC 7 Downloader Architecture Evolves 8 VULNERABILITIES 10 Increased Adobe Flash Exploitation 10 Proliferation of Exploit Kits 11 Hacking Team Hacked; Zero-Days Leaked 12 HACKTIVISM 14 Ideological Hacktivism in International Decline 14 Increase in Hacktivist OPSEC 15 Shift to Criminal and Notoriety Hacktivism 15 Increasing Size, Complexity of DDoS Attacks 16 CONCLUSION 18 ABOUT VERISIGN 18 2 Verisign Public | 2016 Cyberthreats and Trends INTRODUCTION The Verisign iDefense 2016 Cyberthreats and Trends Report provides an overview of the key cybersecurity trends of the previous year and insight into how Verisign believes those trends will evolve over the coming year. The objective of this report is to assist in informing cybersecurity and business The Verisign iDefense 2016 operations teams of the critical cyberthreats and trends impacting their Cyberthreats and Trends enterprises, helping them anticipate key cybersecurity developments and more Report provides an overview effectively triage attacks and allocate increasingly limited resources. of the key cybersecurity trends of the previous year This report features conclusions drawn from Verisign iDefense Security and insight into how Verisign Intelligence Services research and analysis covering cybercrime, hacktivism believes those trends will and vulnerabilities. These areas of coverage include public and zero-day evolve over the coming year. vulnerabilities, threat tactics, distributed denial of service (DDoS) attacks, threat actors, threats to key infrastructure, strategic intent, malware tools, and threat and vulnerability management, mitigation and countermeasures.
    [Show full text]